busybox

Licenses: GPL-2.0

Direct Vulnerabilities

Known vulnerabilities in the https://busybox.net|busybox package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

[0,)
  • M
External Control of File Name or Path

[0,)
  • H
External Control of File Name or Path

[0,)
  • M
CRLF Injection

[0,)
  • L
User Interface (UI) Misrepresentation of Critical Information

[0,)
  • L
Improper Neutralization

[0,)
  • H
Heap-based Buffer Overflow

[,1.37.0)
  • H
Use After Free

[,1.37.0)
  • H
Use After Free

[,1.37.0)
  • H
Use After Free

[,1.37.0)
  • M
Directory Traversal

[1.30.1,)
  • C
Arbitrary Code Execution

[,1.35)
  • H
Use After Free

[,1.36.0)
  • H
Arbitrary Code Execution

[0,)
  • H
Use After Free

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • M
NULL Pointer Dereference

[0,1.34.0)
  • M
NULL Pointer Dereference

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • M
Denial of Service (DoS)

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • H
Use After Free

[0,1.34.0)
  • C
Release of Invalid Pointer or Reference

[0,1.34.0)
  • M
Out-of-bounds Read

[0,1.34.0)
  • M
Integer Overflow or Wraparound

[,1.27.2]
  • M
Integer Underflow

[,1.27.2]
  • H
Resource Management Errors

[,1.25.1)
  • H
Out-of-bounds Read

[,1.30.0)
  • H
Improper Certificate Validation

[,1.32.0)
  • M
NULL Pointer Dereference

[,1.27.2)
  • C
Buffer Overflow

[,1.29.0)
  • M
Improper Input Validation

[,1.23.0)
  • H
Remote Code Execution (RCE)

[,1.28.0)
  • H
Integer Overflow or Wraparound

[,1.25.0)
  • H
Out-of-bounds Read

[,1.31.0)
  • H
Improper Handling of Exceptional Conditions

[1.32.0,1.34.0)
  • H
Access Restriction Bypass

[,1.21.0)
  • M
Use of a One-Way Hash without a Salt

[,1.1.3)
  • C
Out-of-Bounds

[,1.25.0)
  • H
Improper Input Validation

[,1.20.0)
  • H
Directory Traversal

[,1.19.0)